Engineering Secure Future Internet Services and Systems [[electronic resource] ] : Current Research / / edited by Maritta Heisel, Wouter Joosen, Javier López, Fabio Martinelli |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (VIII, 393 p. 131 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Software engineering Management information systems Computer science Computer logic Application software Data encryption (Computer science) Systems and Data Security Software Engineering Management of Computing and Information Systems Logics and Meanings of Programs Information Systems Applications (incl. Internet) Cryptology |
ISBN | 3-319-07452-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Structured Comparison of Security Standards -- Empirical Assessment of Security Requirements and Architecture: Lessons Learned -- STS-Tool: Security Requirements Engineering for Socio-Technical Systems -- Model-Driven Development of a Secure eHealth Application -- Modeling Security Features of Web Applications -- On the Synthesis of Secure Services Composition -- Privacy and Access Control in Federated Social Networks -- Engineering Trust-Awareness and Self-adaptability in Services and Systems -- Validation of Access Control Systems -- Evaluation of Engineering Approaches in the Secure Software Development Life Cycle -- A Toolchain for Designing and Testing Access Control Policies -- Verification of Authorization Policies Modified by Delegation -- ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System -- Divide and Conquer – Towards a Notion of Risk Model Encapsulation -- Preserving Data Privacy in e-Health. |
Record Nr. | UNISA-996217780903316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Formal Aspects in Security and Trust [[electronic resource] ] : 5th International Workshop, FAST 2008 Malaga, Spain, October 9-10, 2008, Revised Selected Papers / / edited by Pierpaolo Degano, Joshua D. Guttman, Fabio Martinelli |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (X, 331 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Data encryption (Computer science) Computers and civilization Management information systems Computer science Information storage and retrieval Systems and Data Security Computer Communication Networks Cryptology Computers and Society Management of Computing and Information Systems Information Storage and Retrieval |
ISBN | 3-642-01465-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Formal Certification of ElGamal Encryption -- Secure Information Flow as a Safety Property -- Who Can Declassify? -- Non-Interference for Deterministic Interactive Programs -- Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels -- Causality and Accountability -- Dynamics, Robustness and Fragility of Trust -- Trust within the Context of Organizations: A Formal Approach -- Know What You Trust -- Privacy-Friendly Electronic Traffic Pricing via Commits -- A Formal Privacy Management Framework -- Parameterised Anonymity -- Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder -- Petri Net Security Checker: Structural Non-interference at Work -- Verifying Multi-party Authentication Using Rank Functions and PVS -- The Append-Only Web Bulletin Board -- Secure Broadcast Ambients -- Extending Anticipation Games with Location, Penalty and Timeline -- Do You Really Mean What You Actually Enforced? -- Delegating Privileges over Finite Resources: A Quota Based Delegation Approach -- Access Control and Information Flow in Transactional Memory. |
Record Nr. | UNINA-9910483358103321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Formal Aspects in Security and Trust [[electronic resource] ] : 5th International Workshop, FAST 2008 Malaga, Spain, October 9-10, 2008, Revised Selected Papers / / edited by Pierpaolo Degano, Joshua D. Guttman, Fabio Martinelli |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (X, 331 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Data encryption (Computer science) Computers and civilization Management information systems Computer science Information storage and retrieval Systems and Data Security Computer Communication Networks Cryptology Computers and Society Management of Computing and Information Systems Information Storage and Retrieval |
ISBN | 3-642-01465-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Formal Certification of ElGamal Encryption -- Secure Information Flow as a Safety Property -- Who Can Declassify? -- Non-Interference for Deterministic Interactive Programs -- Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels -- Causality and Accountability -- Dynamics, Robustness and Fragility of Trust -- Trust within the Context of Organizations: A Formal Approach -- Know What You Trust -- Privacy-Friendly Electronic Traffic Pricing via Commits -- A Formal Privacy Management Framework -- Parameterised Anonymity -- Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder -- Petri Net Security Checker: Structural Non-interference at Work -- Verifying Multi-party Authentication Using Rank Functions and PVS -- The Append-Only Web Bulletin Board -- Secure Broadcast Ambients -- Extending Anticipation Games with Location, Penalty and Timeline -- Do You Really Mean What You Actually Enforced? -- Delegating Privileges over Finite Resources: A Quota Based Delegation Approach -- Access Control and Information Flow in Transactional Memory. |
Record Nr. | UNISA-996466037203316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Formal Aspects in Security and Trust [[electronic resource] ] : Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers / / edited by Theo Dimitrakos, Fabio Martinelli, Peter Y.A. Ryan, Steve Schneider |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (X, 259 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Operating systems (Computers) Computers and civilization Management information systems Computer science Information storage and retrieval Computer Communication Networks Cryptology Operating Systems Computers and Society Management of Computing and Information Systems Information Storage and Retrieval |
ISBN | 3-540-32629-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Voting Technologies and Trust -- On the Formal Analyses of the Zhou-Gollmann Non-repudiation Protocol -- Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks -- A Formal Approach for Reasoning About a Class of Diffie-Hellman Protocols -- Eliminating Implicit Information Leaks by Transformational Typing and Unification -- Abstract Interpretation to Check Secure Information Flow in Programs with Input-Output Security Annotations -- Opacity Generalised to Transition Systems -- Unifying Decidability Results on Protection Systems Using Simulations -- Proof Obligations Preserving Compilation -- A Logic for Analysing Subterfuge in Delegation Chains -- Probable Innocence Revisited -- Relative Trustworthiness -- Secure Untrusted Binaries — Provably! -- Normative Specification: A Tool for Trust and Security -- Type-Based Distributed Access Control vs. Untyped Attackers -- A Security Management Information Model Derivation Framework: From Goals to Configurations -- On Anonymity with Identity Escrow -- Towards Verification of Timed Non-repudiation Protocols. |
Record Nr. | UNISA-996466098103316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Formal Aspects in Security and Trust [[electronic resource] ] : Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers / / edited by Theo Dimitrakos, Fabio Martinelli, Peter Y.A. Ryan, Steve Schneider |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (X, 259 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Operating systems (Computers) Computers and civilization Management information systems Computer science Information storage and retrieval Computer Communication Networks Cryptology Operating Systems Computers and Society Management of Computing and Information Systems Information Storage and Retrieval |
ISBN | 3-540-32629-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Voting Technologies and Trust -- On the Formal Analyses of the Zhou-Gollmann Non-repudiation Protocol -- Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks -- A Formal Approach for Reasoning About a Class of Diffie-Hellman Protocols -- Eliminating Implicit Information Leaks by Transformational Typing and Unification -- Abstract Interpretation to Check Secure Information Flow in Programs with Input-Output Security Annotations -- Opacity Generalised to Transition Systems -- Unifying Decidability Results on Protection Systems Using Simulations -- Proof Obligations Preserving Compilation -- A Logic for Analysing Subterfuge in Delegation Chains -- Probable Innocence Revisited -- Relative Trustworthiness -- Secure Untrusted Binaries — Provably! -- Normative Specification: A Tool for Trust and Security -- Type-Based Distributed Access Control vs. Untyped Attackers -- A Security Management Information Model Derivation Framework: From Goals to Configurations -- On Anonymity with Identity Escrow -- Towards Verification of Timed Non-repudiation Protocols. |
Record Nr. | UNINA-9910485047703321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Foundations of Security Analysis and Design III [[electronic resource] ] : FOSAD 2004/2005 Tutorial Lectures / / edited by Alessandro Aldini, Roberto Gorrieri, Fabio Martinelli |
Edizione | [1st ed. 2005.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
Descrizione fisica | 1 online resource (VIII, 276 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Operating systems (Computers) Computer communication systems Management information systems Computer science Computer logic Systems and Data Security Cryptology Operating Systems Computer Communication Networks Management of Computing and Information Systems Logics and Meanings of Programs |
ISBN |
3-540-31936-0
3-540-28955-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | FOSAD 2004 (6-11 September 2004) -- Justifying a Dolev-Yao Model Under Active Attacks -- Model-Based Security Engineering with UML -- A Tutorial on Physical Security and Side-Channel Attacks -- Static Analysis of Authentication -- FOSAD 2005 (19-24 September 2005) -- Formal Methods for Smartcard Security -- Privacy-Preserving Database Systems -- Intrusion Detection: Introduction to Intrusion Detection and Security Information Management -- Security and Trust Requirements Engineering. |
Record Nr. | UNINA-9910484151203321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Foundations of Security Analysis and Design III [[electronic resource] ] : FOSAD 2004/2005 Tutorial Lectures / / edited by Alessandro Aldini, Roberto Gorrieri, Fabio Martinelli |
Edizione | [1st ed. 2005.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
Descrizione fisica | 1 online resource (VIII, 276 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Operating systems (Computers) Computer communication systems Management information systems Computer science Computer logic Systems and Data Security Cryptology Operating Systems Computer Communication Networks Management of Computing and Information Systems Logics and Meanings of Programs |
ISBN |
3-540-31936-0
3-540-28955-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | FOSAD 2004 (6-11 September 2004) -- Justifying a Dolev-Yao Model Under Active Attacks -- Model-Based Security Engineering with UML -- A Tutorial on Physical Security and Side-Channel Attacks -- Static Analysis of Authentication -- FOSAD 2005 (19-24 September 2005) -- Formal Methods for Smartcard Security -- Privacy-Preserving Database Systems -- Intrusion Detection: Introduction to Intrusion Detection and Security Information Management -- Security and Trust Requirements Engineering. |
Record Nr. | UNISA-996465619803316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Foundations of Security Analysis and Design VII [[electronic resource] ] : FOSAD 2012 / 2013 Tutorial Lectures / / edited by Alessandro Aldini, Javier Lopez, Fabio Martinelli |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (VIII, 282 p. 98 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Management information systems Computer science Computers Systems and Data Security Cryptology Management of Computing and Information Systems Theory of Computation |
ISBN | 3-319-10082-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Model-Based Testing for Functional and Security Test Generation -- Model-Based Security Engineering: Managed Co-evolution of Security Knowledge and Software Models.- Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif.- Defensive JavaScript: Building and Verifying Secure Web Components.- Information Flow Control for Web Scripts -- EasyCrypt: A Tutorial.- Cryptographic Voting — A Gentle Introduction.- Encryption and Fragmentation for Data Confidentiality in the Cloud.- Location Privacy in WSNs: Solutions, Challenges, and Future Trends. |
Record Nr. | UNINA-9910483566503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Foundations of Security Analysis and Design VII [[electronic resource] ] : FOSAD 2012 / 2013 Tutorial Lectures / / edited by Alessandro Aldini, Javier Lopez, Fabio Martinelli |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (VIII, 282 p. 98 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Management information systems Computer science Computers Systems and Data Security Cryptology Management of Computing and Information Systems Theory of Computation |
ISBN | 3-319-10082-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Model-Based Testing for Functional and Security Test Generation -- Model-Based Security Engineering: Managed Co-evolution of Security Knowledge and Software Models.- Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif.- Defensive JavaScript: Building and Verifying Secure Web Components.- Information Flow Control for Web Scripts -- EasyCrypt: A Tutorial.- Cryptographic Voting — A Gentle Introduction.- Encryption and Fragmentation for Data Confidentiality in the Cloud.- Location Privacy in WSNs: Solutions, Challenges, and Future Trends. |
Record Nr. | UNISA-996198264103316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Foundations of Security Analysis and Design VIII [[electronic resource] ] : FOSAD 2014/2015/2016 Tutorial Lectures / / edited by Alessandro Aldini, Javier Lopez, Fabio Martinelli |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (VII, 163 p. 36 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Management information systems Computer science Application software Computers and civilization Systems and Data Security Cryptology Management of Computing and Information Systems Information Systems Applications (incl. Internet) Computers and Society |
ISBN | 3-319-43005-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Efficient Zero-Knowledge Proof Systems -- JavaScript Sandboxing: Isolating and Restricting Client-Side JavaScript -- From Zoos to Safaris — From Closed-World Enforcement to Open-World Assessment of Privacy -- Distributed Authorization in Vanadium. |
Record Nr. | UNISA-996466034803316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|